Professional Documents
Culture Documents
Midterm Assignment8 Jarantilla
Midterm Assignment8 Jarantilla
1. If you use an open network, what email configuration setting should you ensure is
enabled?
Enable Secure Sockets Layer or Transport Layer Security (SSL/TSL) encryption to
protect the account password.
2. You have installed a screensaver application. Later, after updating your anti-virus
software, a malicious program is found. This appears to have infected your system at the
same time as the screensaver was installed. What class of malware is this?
Trojan Horse – an apparently legitimate application that conceals malicious
functions, such as spyware or a bot allowing remote control of the PC.
3. You want to use a website that hosts training modules in a custom media format. What
type of add-on would you need to install to play this media?
You would need to install a type of browser add-on called a plug-in. It should be
restricted to interacting with the media object on the web page.
4. What type of file might a website use to track whether you have visited it before?
Cookie – It is plain text produced by a website when you visit it. The cookies’
purpose is to store session information in order to personalize the website.
5. True or false? Browser pop-up windows are definite symptoms of virus infection.
False – these might be a result of adware or an intentional showcase of a particular
website (which, admittedly, you would not want to visit frequently).
6. You are using a computer in an Internet cafe. What should you do at the end of the
session?
Clear the browser cache – It is a smart option to clear your browser cache as it
prevents you from using old forms. So, it protects your personal identification.
7. What identifies a website as using the secure HTTPS protocol with a valid certificate?
The URL shows the “https://” protocol and the browser shows a padlock icon. For
sites that have passed special validation regimes, the address bar will be shown in
green.
If a site uses "https," but the certificate is not trusted by the browser, an alert is
displayed.
8. You want to restrict access to a computer on your network to a single Internet host
running a particular application. What two things do you need to configure in your
firewall's access control list?
The IP address of the host and the port number of the application.